The TLS handshake protocol: A modular analysis
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 1263181 (Why is no real title available?)
- scientific article; zbMATH DE number 1302834 (Why is no real title available?)
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 1088907 (Why is no real title available?)
- scientific article; zbMATH DE number 1149909 (Why is no real title available?)
- scientific article; zbMATH DE number 1942417 (Why is no real title available?)
- scientific article; zbMATH DE number 1942418 (Why is no real title available?)
- scientific article; zbMATH DE number 2081072 (Why is no real title available?)
- scientific article; zbMATH DE number 1775427 (Why is no real title available?)
- scientific article; zbMATH DE number 2086700 (Why is no real title available?)
- scientific article; zbMATH DE number 2086716 (Why is no real title available?)
- scientific article; zbMATH DE number 1842499 (Why is no real title available?)
- Authenticated key exchange secure against dictionary attacks
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Key agreement protocols and their security analysis
- Modular Security Proofs for Key Agreement Protocols
- Public Key Cryptography - PKC 2005
- The Layered Games Framework for Specifications and Analysis of Security Protocols
- Universally Composable Security Analysis of TLS
Cited in
(21)- Analysis of the SSH key exchange protocol
- The design and implementation of protocol-based hidden key recovery
- On the security of the pre-shared key ciphersuites of TLS
- scientific article; zbMATH DE number 1942417 (Why is no real title available?)
- Encryption modes with almost free message integrity
- Modelling ciphersuite and version negotiation in the TLS protocol
- scientific article; zbMATH DE number 2080687 (Why is no real title available?)
- Universally Composable Security Analysis of TLS
- Safely exporting keys from secure channels. On the security of EAP-TLS and TLS key exporters
- scientific article; zbMATH DE number 1977206 (Why is no real title available?)
- Design and implementation of trusted enhanced TLS protocol
- On the security of the TLS protocol: a systematic analysis
- A Modular Security Analysis of the TLS Handshake Protocol
- On the security of TLS-DHE in the standard model
- Proving the TLS handshake secure (as it is)
- Virtualizing access to scientific applications with the application hosting environment
- (De-)constructing TLS 1.3
- Hash function combiners in TLS and SSL
- A security proof for key exchange protocols
- Authenticated confidential channel establishment and the security of TLS-DHE
- Tag size does matter: attacks and proofs for the TLS record protocol
This page was built for publication: The TLS handshake protocol: A modular analysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2267369)